General

  • Target

    a8ba9b7c073a8b6f96f3a5ff47169590901a319236e88d0bc2ee7f4e4c079cac

  • Size

    852KB

  • Sample

    241105-1plvqsyhlb

  • MD5

    06caacf8da7f9276840b7a3352c141ae

  • SHA1

    7c8caa8f3fc0bb73245b90d6e67926799b4e2dea

  • SHA256

    a8ba9b7c073a8b6f96f3a5ff47169590901a319236e88d0bc2ee7f4e4c079cac

  • SHA512

    1422fb41a89b1d5ae3fbb96fc62963ed5d46d2e54dca40f43006b0d588c31a5e3ba3d81ddf800c279007be8948e6e9cac7e3636dfd7acbb87f1b72dbea24e99d

  • SSDEEP

    24576:6ytUxnTzoVbNfCD8h2OeSiIOOenEPlCRZ4Rm68fOl:BWxnPkQghUHIOnEPYZ4RXIO

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      a8ba9b7c073a8b6f96f3a5ff47169590901a319236e88d0bc2ee7f4e4c079cac

    • Size

      852KB

    • MD5

      06caacf8da7f9276840b7a3352c141ae

    • SHA1

      7c8caa8f3fc0bb73245b90d6e67926799b4e2dea

    • SHA256

      a8ba9b7c073a8b6f96f3a5ff47169590901a319236e88d0bc2ee7f4e4c079cac

    • SHA512

      1422fb41a89b1d5ae3fbb96fc62963ed5d46d2e54dca40f43006b0d588c31a5e3ba3d81ddf800c279007be8948e6e9cac7e3636dfd7acbb87f1b72dbea24e99d

    • SSDEEP

      24576:6ytUxnTzoVbNfCD8h2OeSiIOOenEPlCRZ4Rm68fOl:BWxnPkQghUHIOnEPYZ4RXIO

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks